Back to Results
First PageMeta Content
Visual cryptography / Cryptographic protocols / Key management / Digital photography / Image processing / Secret sharing / Pixel / Computing / Steganography / Cryptography / Computer graphics / Espionage


A Threshold Visual Cryptography Scheme
Add to Reading List

Document Date: 2008-12-18 11:45:43


Open Document

File Size: 122,11 KB

Share Result on Facebook
UPDATE